IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed   
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 

Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Management Multimedia (View All Report Types)
1 - 25 of 203 Matches Previous Page  |  Next Page
Learn How to Enhance Visibility and Early Detection by Using the SOC Triad
sponsored by Vectra Networks
WEBCAST: In this podcast, join security experts and business leaders from Cybereason, Vectra and Splunk as they discuss how to enhance visibility and early detection by using the SOC triad. But what is the SOC triad? Give the podcast a listen to discover the 3 components of the SOC triad and learn how to operationalize it.
Posted: 29 May 2020 | Premiered: Apr 24, 2020

Vectra Networks

Making Sense of MITRE ATT&CK Evaluations to Address Your Cybersecurity Needs
sponsored by Dell SecureWorks
WEBCAST: The MITRE ATT&CK framework provides globally accessible information regarding adversary tactics and techniques based on observations. To further help end-users, MITRE uses the ATT&CK framework to evaluate various offerings and vendors. Watch this webinar to learn more about the evaluations and how to use them to address your security needs.
Posted: 28 May 2020 | Premiered: May 28, 2020

Dell SecureWorks

OWASP Top 10: The Most Critical Risks Facing Web Applications
sponsored by F5 Networks
WEBCAST: Today’s organization uses an average of 983 different applications. As such, ensuring the protection of these web applications is critical for avoiding disruptive breaches and maintaining operational efficiency. In this webinar, explore the top 10 most critical risks facing today’s web applications and the steps you can take to mitigate them.
Posted: 28 May 2020 | Premiered: May 28, 2020

F5 Networks

Threats Using Coronavirus as a Lure
sponsored by Trend Micro
WEBCAST: As the coronavirus continues to spread, so too does the wave of cyberattacks and campaigns that leverage the pandemic as their entry point. In this webinar, join Jon Clay, Director of Global Threat Communications at Trend Micro, as he highlights current threat trends and common tactics being used by hackers.
Posted: 26 May 2020 | Premiered: May 26, 2020

Trend Micro

Equifax and the 147 Million: One Individual’s Story from behind the Headlines
sponsored by Auth0
VIDEO: What is it like to have your data compromised or your identity stolen? In this video, sit down with one of the 147 million victims of the notorious 2017 Equifax data breach as they share their experience regarding the long-term impacts of this incident and their struggle to seize back control from identity thieves.
Posted: 20 May 2020 | Premiered: 30 Mar 2020

Auth0

Punycode: Awareness and Protection
sponsored by Cisco Umbrella
VIDEO: The topic of this episode of A Cybersecurity Technical Mini Series: Punycode. But what is Punycode, how does it work & why is it important? To find out, join Chris Riviere, a security expert at Cisco as he further explores this malicious domain tactic.
Posted: 19 May 2020 | Premiered: 16 Dec 2019

Cisco Umbrella

Cloud Native Security
sponsored by Rackspace
WEBCAST: The global shift towards cloud tools and capabilities has completely changed the cybersecurity landscape. Now more than ever, organizations need to re-evaluate their cloud security strategy to reflect today’s challenges. In this webcast, join security experts at Rackspace and AWS as they discuss these challenges and explore how to address them.
Posted: 19 May 2020 | Premiered: May 19, 2020

Rackspace

Okta ASA Netskope Private Access demo
sponsored by Okta + Netspoke
VIDEO: In this video demo, join a Solutions Architect at Okta as they provide a quick walkthrough of how Okta Advanced Server Access & Netskope Private Access can work together to enhance user experience.
Posted: 18 May 2020 | Premiered: 12 Mar 2020

Okta + Netspoke

The Big Easy - 3 steps for better security
sponsored by Cisco Umbrella
VIDEO: In this video, take a look at the 3 most common threat vectors, and discover best-practices for detecting, isolating and mitigating these threats before they have a chance to strike.
Posted: 15 May 2020 | Premiered: 11 Dec 2019

Cisco Umbrella

Synack CISO Podcast Series: Action in Unprecedented Times
sponsored by Synack
PODCAST: In this episode of the Synack CISO Podcast Series, the hosts are joined by Mike Newborn, CISO at Navy Federal Credit Union, as they discuss ensuring the safety and productivity of employees during these trying times, as well as building customer trust and the increase in malicious activity. Listen to the podcast to learn more.
Posted: 12 May 2020 | Premiered: May 12, 2020

Synack

Webinar: "I Love Agent-Based Security!" Said No One, Ever.
sponsored by Orca Security
VIDEO: As organizations continue to rely on cloud assets and environments, the efficacy of agent-based security wanes. In this webinar, join a panel of CSOs as they break down their budget and best practices for securing their environments, discuss the hidden risks plaguing your network, and more. Watch now to get started.
Posted: 08 May 2020 | Premiered: 10 Apr 2020

Orca Security

What Is Intrinsic Security?
sponsored by VMware International Unlimited Company
VIDEO: In this video, join Tom Corn, Senior Vice President of security products at VMware as he defines the concept of intrinsic security and outlines the value it can bring to your security efforts as well as business operations as a whole.
Posted: 05 May 2020 | Premiered: 05 May 2020

VMware International Unlimited Company

Industry and Financial Regulations: The Implications for Application Security
sponsored by Veracode, Inc.
WEBCAST: Today’s financial institutions face stringent regulations to ensure the responsible management and protection of sensitive user data. In this webinar, join Chris Wysopal, CTO and co-founder of Veracode, as they navigate the security and compliance implications of building and maintaining a mobile financial application.
Posted: 05 May 2020 | Premiered: May 5, 2020

Veracode, Inc.

3 Steps to Secure Remote Workers and Students
sponsored by Cisco Umbrella
VIDEO: As remote access appears to become the new norm for students, workers and medical patients, ensuring the security of the users and their devices is critical. In this webinar, join Meg Diaz, head of cloud security marketing at Cisco, as they offer their expertise for securing remote workers and students.
Posted: 05 May 2020 | Premiered: 30 Mar 2020

Cisco Umbrella

E-commerce has been revolutionized in the last decade
sponsored by The Media Trust
WEBCAST: Most brands don’t control or manage 65-95% of the code that defines the digital shopping experience. While this code enables critical features, it exposes organizations to potential security risks. In this webinar, take a closer look at third-party risk areas and discover how to address these challenges.
Posted: 05 May 2020 | Premiered: May 5, 2020

The Media Trust

Evolution of Email Security
sponsored by Barracuda
WEBCAST: Ever since it became a critical tool for business communications, email has been the target of increasingly sophisticated cyberattacks. In this webinar, join Barracuda security experts as they overview the evolution of email security from early inbox threats to campaigns taking advantage of the current pandemic.
Posted: 04 May 2020 | Premiered: May 4, 2020

Barracuda

Virtual Cloud Security Summit: Securing Your Network from the Cloud
sponsored by Cisco Umbrella
VIDEO: With organizations continuing to embrace cloud migration, a shift in security is also necessary to maintain the protection of cloud-native workloads. In this video, discover how Cisco Umbrella unifies security capabilities for cloud users to ensure safe adoption and access. Watch now to get started.
Posted: 04 May 2020 | Premiered: 02 Apr 2020

Cisco Umbrella

Passwordless Authentication Solutions by Thales
sponsored by Thales
VIDEO: Passwords are the weak link to cybersecurity, being at the root cause of more than 80% of today’s data breaches. This brief video highlights the features and capabilities of SafeNet Trusted Access, Thales’ designed to provide access management that looks beyond the need for passwords. Watch now to learn more.
Posted: 30 Apr 2020 | Premiered: 10 Mar 2020

Thales

Barracuda Forensics and Incident Response
sponsored by Barracuda
VIDEO: When it comes to email-based threats, incident response is traditionally a manual process that costs time and money. In this short video, take a closer look at the key features of Barracuda Forensics and Incident Response, which is designed to replace outdated methods with an automated, data-driven approach.
Posted: 24 Apr 2020 | Premiered: 24 Apr 2020

Barracuda

Skybox Security Overview
sponsored by Skybox Security
VIDEO: This short video highlights the key capabilities of the Skybox Security Suite, which offers functionalities that range from vulnerability and threat management to firewall and security policy management. Learn more about the suite now, and see if it’s a good fit for your needs.
Posted: 23 Apr 2020 | Premiered: 15 Apr 2019

Skybox Security

Protecting Business and Remote Workers from COVID-19 Email Threats
sponsored by Barracuda
VIDEO: The recent shift to working remotely as a result of the spread of COVID-19 has made organizations more vulnerable to email-based cyberattacks. This webinar breaks down the various methods being used by hackers and offers best practices for protecting your business and workers.
Posted: 21 Apr 2020 | Premiered: 21 Apr 2020

Barracuda

Beyond the Headlines: How is the Pandemic Really Changing Cyberattacks?
sponsored by CI Security
WEBCAST: The spread of the Coronavirus has affected nearly every aspect of our lives, so it should come as no surprise that cyberattackers are taking full advantage. In this webinar, leverage the expertise of an industry expert as they highlight vulnerable areas hackers target most often and offer best practices for mitigating these threats.
Posted: 20 Apr 2020 | Premiered: Apr 20, 2020

CI Security

WEBINAR: Protecting Against Coronavirus Email Fraud
sponsored by Armorblox
VIDEO: Socially engineered attacks are always aligned with what people are talking (or worried) about. So, it should come as no surprise that record amounts of cyberattacks have been using the current Coronavirus pandemic as a lure to cause disruptions. Watch this webinar to learn more about their tactics and how to spot them.
Posted: 14 Apr 2020 | Premiered: 08 Apr 2020

Armorblox

Webinar: The TCO of Automated, Cloud-Native Patch Management
sponsored by Automox
WEBCAST: Most enterprises currently employ an on-premises patch management solution for addressing key risk areas. However, like most modern business tools, going cloud-native can decrease overhead while improving agility and scale. Watch this webinar to learn how to improve your patch management by going cloud-native.
Posted: 10 Apr 2020 | Premiered: Apr 10, 2020


Webinar: Managing the Cybersecurity Risk of Your Growing Remote Workforce
sponsored by Automox
WEBCAST: Due to recent events, the workforce has completely shifted, and organizations are forced to adopt remote work policies. In this webinar, join two Automox security experts as they offer insight into seamlessly transitioning your security posture (including endpoints and mobile devices) to reflect the changes in your workforce.
Posted: 09 Apr 2020 | Premiered: Apr 9, 2020

1 - 25 of 203 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info